Analysis

  • max time kernel
    121s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-11-2024 10:02

General

  • Target

    Kraxx-Builder/Kraxx-OS-Builder/Settings/AssemblyList_4_extended.xml

  • Size

    8KB

  • MD5

    a87b873d20ae123d3ef356b2a971c9df

  • SHA1

    670f14fd1082341c25ec7926a9794da9d6d43f4f

  • SHA256

    0550606fb6604bb229f973dc60984754eff1ea3d6d86f64658918b121cfe13ef

  • SHA512

    8755e2033fd218c2e29ae5d67c6bb1317effd7fa67407f2a9f050a1dafe5644df5ef92a6040a703a525213c9ff13c57dc49d77941db9bc5b22f3fc0644d67637

  • SSDEEP

    48:3gD/NgfoENgf9+oCWyNg8tNg8PNg8UCNg5fiNg8fENg8iNg81QNg8oENg8FZNg8N:4SoCWjWlVvfpFhFPXztrFoflH

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Kraxx-Builder\Kraxx-OS-Builder\Settings\AssemblyList_4_extended.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3064
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2704
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2704 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    16f1c56436c3e86e06e3984b8c188089

    SHA1

    989521b315e8c512305fbe34282e91a7f7fbbc82

    SHA256

    53d02eda33ac45a91be69c30e1d4d7a7041e7ddc4699fd32ff2f15981320530b

    SHA512

    71d14508920931ee4c300033669260c82505f7e91edc17ca53bf7e132fd8d9264f85d08acabf43499f35a5e5b6753cfba1e85b8c2984a53a6d1dd775aa4e5b68

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7ed98fd5877432fc84084ee18ba4182a

    SHA1

    4019b733d799d501d9db7f42b9f4fbc5df7c8a4e

    SHA256

    14c7466d95a6968ac5bf1c0e0116f7d7e97fe4055bcba2dd605a32de4abd50c4

    SHA512

    a05d103979fe8f5ecaf366c5b3fe9c1adc90a501f676c33c3e1653a307b623fcc14c9607e9aa70242e4369e158ddba84ef794fbf711a7fb4519bef4a8eb7d368

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5194db7b993eebda7e72ce25c9734019

    SHA1

    929df722a76cfc542b5499f73c37858d214f2a79

    SHA256

    9d53c0687ca60fdc494d9b44196793968cfbb1e52695cfc7494549ffc6077b20

    SHA512

    3873bd14d0db8a6065de8bba929e58b6c78d173a7dc372b88ed7f7f0adf9a5d8253425cdaa3d0ffd8f8a0c31c6707d7bcaef66c3f3b0d0521d43ffa8cfcfcb5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1b1d6108f1064e48c4a2fe660207b46b

    SHA1

    e632902645167f51a57e3b1f2ea7f93823240067

    SHA256

    0280c8bdaeb8b4e6da82a33c7d071f3c40c099d58655322e19f60bdf51620d6c

    SHA512

    38ed5ab36e657a1ec1cefaa48d1bd41ad759944646f8b0c8f80c995c508c7d9461432e000d3ef0544d0bc8c0020f32a281ae9555377c2a9c59e7734ff8319cec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9016d5a50468768c5bc59720ee714c9

    SHA1

    36aa2d1992ad7391283e4739f3a2b369c8d7b897

    SHA256

    e9de6a2e4d27e346febfad7e129b518fa55a60bfa25ccd31c90bcd0c5546ff4d

    SHA512

    52c0dd212cde0ad660010a1bc3c0c017102a740011fbc0a296228b397e97fe63cf88f60adbd91070a412dda4450ae9be0c26a5d4ea552fafbb2063021bca7408

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    23af81a99e458855c2c9570904d4cd9f

    SHA1

    6069d05796daabe3eee64511627137e8a23651f1

    SHA256

    fdc4dfbf8e8945098fc2b1da854e319b0af353a87d01eceda2a07c05c5a74797

    SHA512

    92f2e29ef94fac16c0fbdb5fc449db34a4ca277bbf7421a755b6423f3f913c06f1cb3c35fd701c2e10adb24c4cbeb3213f0592f0fffd9eb697b17e06a1bd8cbe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    660ffeb3bf0c8dbe78b321de19eb9e11

    SHA1

    a8b4e8fc97b3cc9ae97c45d6ed3bb5e09277c981

    SHA256

    cde1586af763ee66995d5b55d37e8af66590ac2a6d1bd5ead5ed0afe26968a67

    SHA512

    be5bc3b6ed1ccf9999ca77bb2ccb77f9fcb7c702897683292e41aad6fd572b1ff5a9c67df1193c5a40b689f0c7f11bb33104da65d193416121ec725bb4c848ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    35d220f5b680582ab9a8eaba0c959aa4

    SHA1

    8a07782cbc57233dc81447c1dec1067f03002b3b

    SHA256

    b2fadc313906a9f59397adb5212fa1fdc740a49e358d6ca0d16222260af00c03

    SHA512

    067957aababbc0d35d0d036bf2a0c4240d9c110b9f93d9adfc80ca29bda76bf64eada24609df2563e5651d7127198277d0bfa9af8713f2316ee8dbcb9cce8848

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2e83b7dd3ba949deb80e4e1ec9473ee5

    SHA1

    2653de733ce18c8e1119762e659107bcfcf37e47

    SHA256

    a597049a8682e2004f4ba8e785c5bf4862be109dde6553b147e49eaa7406a485

    SHA512

    94fe4c5096abde2d37e6ced2e3a2ef3a1f44c9262c665897a40a026b903c61b8c7730bf11b071ee2a90caff1cd07fc099057b15ed19dc889b3cbfaf80efc5287

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    939e6bed56b55886f10eee45efe4de0c

    SHA1

    2d5b10bb72cc663bcf338180dd834e58b9f63675

    SHA256

    50918ab6867e933273271155aec7c5cb1618ee3bb112222164d9a7ca6c6b0982

    SHA512

    c68a19aeb7198f3afbe92f19775739bc4a23e913b25605863c499fb10508104ef2498024ed1ad2d1312619185bc8b1098076f12e4e124225d33db37124f0df9d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    89c8042dfabcca664d08a9203d7c02a9

    SHA1

    7dcf602b329d7d167306a7c616847cf1a0b9ecfa

    SHA256

    ab1d59fc3c4948735a2605318974e40ee87849f150f289557e09f33541d72b5a

    SHA512

    f299fbdc0fd5bcd2afae8476cebbf06b68cb7296eb61af1bff45131763489821f872d3567c99a6f53df43231aeb62e672f08cefd18f1c6afaab6f74d2e685673

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    53859eb47c79c295ae762aa294edcc20

    SHA1

    123a4e9a085d02d0458f6a459a888b579b954c6a

    SHA256

    00c4321fe1cd0011c852f169cda8c1da6ecf01339b542e6cb93087e37f858913

    SHA512

    5bdb3acd2de167e0c3be6c7ec633a2a9403bbc9b64d87c74ab1bcb604cda9594d5cd5ebf843f28882d85d4249cd21818479a18170f79c8cec5e6f7fc3f233c0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9223d6ac7b36e35d9fbb19275f033929

    SHA1

    a74242b51f7a6e93786110e7682ccefa6c5e881f

    SHA256

    810e0b219763d3e9dcbb6f5124f86f7b33589e697f62288bbd2504f1cd3fc1d3

    SHA512

    2920990b171b895eb7de01fef60d25b8bbfbc6310aec595e33206217e2076abed94b172f3acbef2fb6b0b43569ac09c64ba057ff10afdc92f7276bbc00910347

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad68c217ae483842b6150cfb1db397d2

    SHA1

    b4d5e7807d5758f68b5681678af0d3620d4a4f48

    SHA256

    51afc72ac94d1bcc531d973d7e386d7916f15ec753c362a626d4b7bf73392bfe

    SHA512

    2aa84c81312412e2f6ca93dbce10cf8e3474df639fe8303415af2c80768c55079ce2ac1b693f0c991fa9a9399fe3d6fff5ac755133f27b58291df7fc376a21fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    86084668df37571c1d7847097f2f4699

    SHA1

    eb866bb5b296f607c98f4193b3d9b22c8cc12d63

    SHA256

    c855da485940a8dd4e06f3a8f89b0e2cbf05d9201ffe8f0122e2e2260445adac

    SHA512

    e32007583172b3b1c9192f8ebd5e610d7ea1974eec23fb6d8c5758ed62cb60848aa89ed45668e5eb74826b426937bd3b5eed0c8630658b3a2f162d204aff1bfd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e130478a7ab2e16d8229087cb823fd23

    SHA1

    fd4741506eced797d3168abb271e58288db763c4

    SHA256

    f559a03e60b1361103cb1dd8b3e69b4cc86cb9236fea4525178540cd4a251623

    SHA512

    a2431278c905a344d9451b9667e646123a8a386c822b8e53f27b2304b2fb27794b138f071dfcb0f8e923bdb0d0cd4379012d48ce099943a6b3922aa80a9ecd66

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    23ffd988cd1740a757b2f4c3b28de33b

    SHA1

    3aff09ee0962132fbb8646fdf7d2ac6cc00b2283

    SHA256

    9444681bbb8898f32987ef1a6a06c358d1a5b3175010ec5a6e62ce1bf22a26f6

    SHA512

    bd1cdbbb2c3907ca191f53209e97e8e148e4b2f652257c03f86edfefc06f5ffc71e3b9d7de343e0c5122a0350b87d84ace467a9bd4acbfcb73bd39c74e920ba2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    25acca91bfba3c026553f325316a973c

    SHA1

    d82fcce89508d6a6adb2da70722a7fbfe5743b06

    SHA256

    0eb18df08d664a76813ee6874bbe629383fe1206a2839b4556344c33479c704b

    SHA512

    cd4d15ca0d9411b8ba563baf1eb403c307f7af549337cb18d6fc11372cd995cd0224ce729cc3c5f0b8fa260deb9cd9a8569cc7d2f1f2f9087dd00044b879935a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7e56b5020fd3a78d8c4e30cd75a25b94

    SHA1

    2879b6d0ef147e890e288f1a350e801959f3ba5d

    SHA256

    17f9ff11cdf27f52a9515b1868400bb49e8b97b31f3097371299a4c5d8e5ae71

    SHA512

    443061a0d56d60debc2da14e148c6c446391949da73dd3a8220e61971c6bad9498a479923e71cac29581623546e585249f09905b8ae45c79d6e377e0823bfb73

  • C:\Users\Admin\AppData\Local\Temp\Cab7FAC.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar805D.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b